EP1668570A1 - Procede d'augmentation de la securite et d'amelioration de la capacite de stockage d'informations - Google Patents

Procede d'augmentation de la securite et d'amelioration de la capacite de stockage d'informations

Info

Publication number
EP1668570A1
EP1668570A1 EP04817180A EP04817180A EP1668570A1 EP 1668570 A1 EP1668570 A1 EP 1668570A1 EP 04817180 A EP04817180 A EP 04817180A EP 04817180 A EP04817180 A EP 04817180A EP 1668570 A1 EP1668570 A1 EP 1668570A1
Authority
EP
European Patent Office
Prior art keywords
item
symbology
encodation
composite
encoded
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
EP04817180A
Other languages
German (de)
English (en)
Inventor
Ronald Barenburg
Rhett C. Bordner
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Secure Symbology Inc
Original Assignee
Secure Symbology Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Secure Symbology Inc filed Critical Secure Symbology Inc
Publication of EP1668570A1 publication Critical patent/EP1668570A1/fr
Withdrawn legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K19/00Record carriers for use with machines and with at least a part designed to carry digital markings
    • G06K19/06Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
    • G06K19/06009Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking
    • G06K19/06046Constructional details
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K19/00Record carriers for use with machines and with at least a part designed to carry digital markings
    • G06K19/06Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
    • G06K19/06009Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking
    • G06K19/06018Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking one-dimensional coding
    • G06K19/06028Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking one-dimensional coding using bar codes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K19/00Record carriers for use with machines and with at least a part designed to carry digital markings
    • G06K19/06Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
    • G06K19/06009Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking
    • G06K19/06037Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking multi-dimensional coding
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K19/00Record carriers for use with machines and with at least a part designed to carry digital markings
    • G06K19/06Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
    • G06K19/06009Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking
    • G06K19/06046Constructional details
    • G06K19/06056Constructional details the marking comprising a further embedded marking, e.g. a 1D bar code with the black bars containing a smaller sized coding
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K7/00Methods or arrangements for sensing record carriers, e.g. for reading patterns
    • G06K7/10Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation
    • G06K7/14Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation using light without selection of wavelength, e.g. sensing reflected white light
    • G06K7/1404Methods for optical code recognition
    • G06K7/1408Methods for optical code recognition the method being specifically adapted for the type of code
    • G06K7/1434Barcodes with supplemental or add-on codes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/08Payment architectures
    • G06Q20/20Point-of-sale [POS] network systems
    • G06Q20/208Input by product or record sensing, e.g. weighing or scanner processing
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07GREGISTERING THE RECEIPT OF CASH, VALUABLES, OR TOKENS
    • G07G1/00Cash registers
    • G07G1/0036Checkout procedures
    • G07G1/0045Checkout procedures with a code reader for reading of an identifying code of the article to be registered, e.g. barcode reader or radio-frequency identity [RFID] reader
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07GREGISTERING THE RECEIPT OF CASH, VALUABLES, OR TOKENS
    • G07G1/00Cash registers
    • G07G1/0036Checkout procedures
    • G07G1/0045Checkout procedures with a code reader for reading of an identifying code of the article to be registered, e.g. barcode reader or radio-frequency identity [RFID] reader
    • G07G1/0054Checkout procedures with a code reader for reading of an identifying code of the article to be registered, e.g. barcode reader or radio-frequency identity [RFID] reader with control of supplementary check-parameters, e.g. weight or number of articles

Definitions

  • the present invention relates broadly to a method and apparatus for improving aspects of information security, information delivery, and information dissemination as well as information storage.
  • the present invention may also relate to a method, apparatus, or system for constructing, deconstructing, and reconstructing coded symbols or parts of coded symbols by means of encodation or decodation methods 2.
  • Bar codes carry information encoded into bars and spaces of various widths, arranged in predetermined patterns. The bars and spaces are made up of unit elements called modules within a selected symbology. At the last count, there were over one hundred (100) defined and known bar code symbologies. Unfortunately, only a handful of these symbologies are in current use, and fewer still are widely known and used internationally. A number of different one-dimensional bar code symbologies (alternatively called or referred to as lD-encodation schemes or ID symbologies) exist.
  • UPC-A UPC-E
  • EAN-8 EAN-13
  • UCC/EAN-128 UCC/EAN-128 and/or other common-type and known ID bar codes as defined by the representative governing councils, and standards defining organizations.
  • This may also include applicable Application Identifiers, UCC Coupon Value Codes and HEBC UCC EAN-128 Secondary Input Data formats encoded in UCC/EAN-128, among others known in the ID bar code symbology field.
  • UCC Uniform Code Council, Inc.
  • EAN International are voluntary standards organizations that together manage the EAN UCC system.
  • AIM Automatic Identification Manufacturers Association
  • AIDC AIDC are also standards defining organizations that set global standards for multiple facets of technology.
  • a UPC-A bar code points to a line item in a database corresponding to that general product and the line item includes only these four (4) items of product information.
  • two-dimensional (2-D) bar codes carry more information per substrate area than linear one-dimensional (1-D) bar codes.
  • 2-D symbols or codes are called two-dimensional because the data in the code is contained in both the horizontal direction (like 1-D/linear codes) and additionally in the vertical direction.
  • a number of different two-dimensional 2D symbologies exist. Some of the symbologies are: Aztec Code, Code 16K, Code 49, Data Matrix and Maxi-Code, etc.
  • PDF-417 symbology is one type of 'stacked' two-dimensional bar code symbology used when needed to encode a greater amount of information within a limited amount of space, thus giving generating an even higher information density encodation scheme.
  • An example of this type of symbology is discussed in U.S. Pat. No. 5,304,786.
  • One type of 2D symbology, "Matrix Type codes" (Maxi-Code, Data Matrix etc.) codes provide this type of high information density storage capacity in a reasonable size, but are also susceptible to inter-row cross-talk problems during use.
  • RSS Reduced Space Symbologies
  • Several variants of RSS exist including Limited RSS, Stacked RSS and Expanded RSS. Expanded RSS includes the ability, to encode limited amounts of additional data beyond the basic UCC/EAN Item Number.
  • GTIN Global Trading Identification Number
  • RSS-14 encodes the full 14 digit UCC/EAN Item Number in a linear symbol that can be scanned rasteringly or omni-directionally by suitably programmed scanners. See Symbol 1.
  • RSS-14 LIMITED is a ID linear symbol that encodes a 14 digit UCC/EAN Item Number with a Packaging Indicator Logistical Variant of zero or one as a prefix to the following number. It is designed for use on small items where label space is horizontally restricted, and will not be scanned at point of sale (POS). See Symbol 2.
  • RSS-14 STACKED is a variation of the RSS-14 symbology that is vertically truncated and stacked in two rows, and is used where label space is vertically restricted, and particularly on items that are not intended to be scanned at point of sale. See Symbol 3.
  • RSS EXPANDED encodes a UCC EAN Item Number plus supplementary element strings such as weight and "best use before" date in a linear symbol that can be scanned omni-directionally by suitably programmed point-of-sale (POS) scanners.
  • RSS Expanded can also be printed in multiple rows as a stacked symbol when the normal symbol would be too wide for the narrow applications.
  • RSS Expanded has a maximum data capacity of 41 alphanumeric or 74 numeric characters. See Symbol 4. Symbol 4 111
  • Any member of the RSS family can be printed as a stand-alone linear symbol or as the Linear (1-D) Component of a Composite (2-D) Symbol.
  • the second new symbology, Composite Symbology consists of a 1-D symbol (RSS, UPC/EAN or UCC/EAN-128) paired with, and optionally in some cases 'electronically' and logically 'linked' to a 2-D symbol printed 'in the immediate area' of the ID symbol.
  • the 2-D symbol is either a PDF-417 symbol, or a UCC/EAN specific variant of Micro-PDF-417.
  • Micro-PDF-417 is the version of PDF-417 designed for small item marking applications (small size), for example in semiconductor and electronic component manufacture.
  • CS Composite Symbol
  • 2-D Composite Symbol
  • LC Linear Component
  • CC-A has a data capacity of up to 56 digits and uses a UCC EAN defined variant of Micro-PDF.
  • B CC-B has a data capacity of up to 338 digits and uses standard Micro-PDF with a UCC EAN reserved codeword.
  • C CC-C has a data capacity of up to 2361 digits and uses a standard PDF-417 with a UCC EAN reserved codeword.
  • a key concept within the Composite Symbology (CS) is 'linking.
  • the Composite Component (CC) of a Composite Symbol (CS) is printed in immediate conjunction with or in immediate reference with a 1-D bar code symbol, (the Linear Component (LC)).
  • the 1-D (LC) symbol In 'linking,' the 1-D (LC) symbol always contains the primary product identification.
  • the conventional Composite Component (CC) always contains a special codeword indicating that the data is in accordance with UCC EAN standards; e.g., (a) that a 1-D symbol is also present (required to read), and (b) that the 2-D bar code is
  • the 1-D bar code also contains a "link,” indicating that a Composite Component (CC) is present and that the 1- D bar code is linked thereto.
  • CC Composite Component
  • “where possible” reflects the fact that while some 1- D/LC symbologies, such as RSS, can support such a link, other 1-D/LC symbologies such as UPC/EAN and UCC/EAN-128, cannot.
  • the ID bar code used within the Composite Symbol (CS) can be RSS, UPC/EAN or UCC/EAN- 128.
  • RSS can be used only with CC-A and CC-B symbologies.
  • the following examples and symbols are included.
  • Composite Symbology (CS) concepts are also applicable to other symbologies, including RSS, RSS-14 Truncated, RSS-14 Expanded, RSS-14 Stacked Omni-directional, UPC-E, EAN-13, EAN-8, with the corresponding Composite variants: CC-A/B, CC-A/B (14), CC-C and CC-C (14).
  • conventional Composite Symbology (CS) which incorporates a 1-D linear component with a 2-D Composite Component, is a new class of symbology designed to address applications that are not being met by current technology solution sets.
  • Composite Symbology (CS) should be understood as a combination of two encodation schemes, generally a ID and 2D scheme.
  • a bar code for a particular type of medicine is generated by a manufacturer (ex. Aspirin).
  • the bar code links to a data base and includes information regarding generally a manufacture, type of product, description of the product and other "higher-order information" (not specific-item information, as will be described).
  • This same bar code is used on one-hundred (100) bottles of Aspirin placed in a single box with five-hundred (500) other bottles and placed on a pallet with five-hundred (500) other boxes and sent to a shipping agent.
  • the shipping agent looses the one box and reports the loss to the manufacturer.
  • the box of Aspirin was stolen by one who copies a previously legitimate bar code from the separate legitimate box, re-labels the stolen goods, and ships the now re-labeled goods to a pharmacy.
  • the linked data base system can only track a product by "higher-order information" and cannot track a product by a designated specific-item information e.g., individual item/bottle/dose/pill (and because the counterfeit bar code is therefore legitimate)
  • the pharmacy when scanning the counterfeit/stolen goods cannot detect the error, the manufacture cannot detect the error, and the pharmacy sells the stolen/counterfeit goods to the public.
  • Various anti-counterfeiting steps and other measures have been taken.
  • EPCTM Electronic Product Codes
  • EPCTM is a new type of designated alpha-numeric code that operates like the old bar code symbologies, in that when used as a coded general identifier and scanned, links to a line in a database, in many cases an internet-maintained database.
  • the EPCTM identifier consists of a string of characters containing information about a specific product or higher order information, i.e.: manufacturer, object classification, and other identifiers specific to an industry and in some rare cases, and a unique serial number for each designated item.
  • the EPCTM system is linked solely with, and transmitted by, the RFID tag technology system, either in 64 or 96 bit configurations.
  • the EPC system unfortunately necessitates all of the software, hardware, and RFID configurations included in an integrated superstructure, as well as being dependent on the unproven online database for tracking and reporting.
  • one other anti-counterfeiting proposal includes the use of RFED technology.
  • Radio Frequency Identification RFID has been advocated as the successor to the bar code because of its ability to store much information in a small button or wired label, and have that information read by out-of-line-of-sight readers, in either singularly or in multiple configurations employing RF signal receivers.
  • Read/Write RFID tags may also allow the 'tagged' information to be electronically updated.
  • drawbacks to the RFID system include the expensive, and the interconnected and integrated infrastructure necessary to support the utilization of RFID as a vehicle for the transportation of information. Additionally, since RFID technology employs tiny RF (Radio Frequency) signals collected by receivers, the location, type, and positioning of the receivers is critical. Many shippers, transporters, manufacturers, and retailers employ unshielded electrical and data lines throughout their facilities. Consequently, before efficient and secure RFID use is achieved, substantial infrastructure costs and reinvestment may be necessary. Additionally, while the future utility of RFID tracking is well known, individual privacy concerns have also grown in parallel with the growth of information tracking.
  • One object of at least one embodiment of the present invention is to provide a method or apparatus useful in improving tracking and identification of various items. Another object of one alternative embodiment of the present invention is to provide a convenient method for real-time secure serialization, identification, and tracking of an item. It is another object of at least one embodiment of the present invention to provide a bar code based tracking system enabling simple item verification and identification with a high security feature. Another object of one alternative embodiment of the present invention is to provide an optional method of constructing, deconstructing and reconstructing a bar code, where alternative proposed embodiments may optionally include bar codes of various types and configurations to include or un-include any of the Symbologies as defined by the aforementioned councils and organizations.
  • Another object of one alternative embodiment of the present invention is to create a bar code encodation scheme (method) which minimizes or reduces the bar code start and stop characters, minimizes the bar code size carrying code words, implicitly encodes the bar code version, and reduces inter-row signal cross-talk. It is hoped that this embodiment and others will generate new bar code applications where traditional two- dimensional bar codes could not be used due to their limiting requirements.
  • the present invention relates, in at least one alternative method or apparatus, a secured item specific identification system incorporating the steps of identifying an item to a determined degree and recording the identification data in a secure database, generating and providing a first composite identifying code labeling the item, generating a second code electronically linked with the first code and separately providing the same to an authorized and identifiable partner, reconstructing the first and second codes upon a receipt of the item into a authorized format, and a step of reading the authorized format and accessing the database to note the authenticity of the item.
  • the first and second codes are optionally linked or provided in alternative and adaptive formats.
  • additional security features structure accessing the database and additional type of codes are incorporated.
  • the present invention provides a secured item specific identification system incorporating the steps of identifying an item to a determined degree, generating a first identifying code labeling the item, generating a second code electronically joined with the first code and separately providing the same to an partner, enabling an access to secure identification data regarding said item upon the use of both the first identifying code and the second code.
  • the first and second codes are optionally linked or provided in alternative and adaptive composite symbology formats.
  • the means for securely accessing includes means for securely updating the authorized-use storage system, whereby the system enables at least a receipt confirmation of the user specified item.
  • a method for enhancing information security during item transfer further comprising the steps of: accessing the authorized-use accessible storage system and determining at least a location of the user specified item.
  • the item specific designation includes both higher-order information and specific-item information effective to provide a user- determined unit designation to the user specified item.
  • a method for enhancing information security during item transfer wherein: at least one of the first and second encoded symbology portions is a 2D symbology encodation, and the other of the first and second encoded symbology portions is a 2D symbology encodation, whereby the readable composite symbology encodation combines the 2D first and second encoded symbologies enabling an increased security during item transfer.
  • the step of encoding the readable composite symbology encodation further comprises a step of: providing additional human readable references to the item specific designation on the at least first and second encoded symbology portions.
  • the step of reconstructing includes at least one of a step of physically reconstructing and at step of electronically reconstructing the first and second symbology encoded portions into the readable composite symbology encodation, whereby the method enables an adaptive reconstructing method improving information security during item transfer.
  • the first 2D encoded symbology portion is an RSS Limited Composite symbology
  • the second ID encoded symbology portion is a RSS Limited Linear symbology.
  • a software platform for managing the methods described above either within a facility, between supply chain partners, or business users linked via the world wide web or internet or intranet via a wire or wireless communication system.
  • an apparatus for enabling an improved security and information transfer between a label generator generating a label for an item and an authorized party receiving the item wherein: the means for reconstructing enables at least one of a physical reconstruction and an electronic reconstruction of the composite symbology encodation.
  • an apparatus for enabling an improved security and information transfer between a label generator generating a label for an item and an authorized party receiving the item wherein: the item specific designation includes at least specific-item information including a designated item serial number, the designated item serial number being at least one of a sequential number, a numeric number, an alpha-character number, and an alpha-numeric number, and the designated item serial number being at least one of an encrypted and non-encrypted number.
  • Fig. 1 is a flow diagram describing selected steps of one alternative embodiment of the present invention.
  • Fig. 2A is a representative example of a label according to one alternative embodiment of the present invention.
  • Fig. 2B is one representative example of a secure identification tag according to the alternative embodiment shown in Fig. 2A.
  • Fig. 3 is a descriptive diagram depicting steps in a labeling process according to one alternative embodiment of the present invention.
  • item/lot level/container/pill/box to meet, at lest in part, one of the goals of future RFID systems, namely individual unit pharmaceutical tracking or other specific item tracking (i.e. identifiable to a designated item for example a pill, syringe, bottle, container, pallet, box, machine, etc.).
  • item-specific or specific-item information is critical in the high technology or pharmaceutical fields for tracking and safety but due to the very large manufacturing lot sizes, number of manufacturing plants, size of worldwide companies and for other reasons it is presently impractical to create a specific individual item serial number identifying a particular item because the identifying information will be to large to incorporate into present symbology systems.
  • Composite Symbology should be broadly understood as a combination of two or more encodation schemes, generally a ID and 2D scheme but now also a 2D scheme and a second or additional 2D scheme or a plurality of 1D/2D schemes.
  • CS Composite Symbology
  • UCC/EAN Linear symbologies such as, but not limited to: UPC-A, UPC-E, EAN-8, EAN-13 and UCC/EAN-128; in various alternative embodiments to orchestrate this adaptation either after the UCC/EAN symbologies have been created, printed, placed on labels or other substrate; and in yet other alternative embodiments to 'link' information by means of adding information in a 2D or Composite format between the Linear and the Composite symbologies, in either a numeric or alpha-numeric or scrambled alpha-numeric format for UPC-A, UPC-E, EAN-8 and EAN-13, and UCC/EAN-128 in order to enhance, change, update, delete or link encoded data contained in the Linear.
  • CS Composite Symbology
  • an item to be tracked is labeled or identified as discussed below with a determined item specific designation, including for example higher order information such as associated manufacture, time, date, place, description, and NDC, and specific item information such as a serial number, and other item selective identifier effective to sufficiently identify a individual item in a discrete manner, e.g. a single ampoule of injectable medicine, or a single box containing a plurality of ampoules.
  • a determined item specific designation including for example higher order information such as associated manufacture, time, date, place, description, and NDC, and specific item information such as a serial number, and other item selective identifier effective to sufficiently identify a individual item in a discrete manner, e.g. a single ampoule of injectable medicine, or a single box containing a plurality of ampoules.
  • alternative embodiments of the present invention may be adapted for use in various manners to improve the ability to track or identify consumer products (e.g., pharmaceuticals, livestock, books, food items, clothing items, aircraft parts, automotive parts or other manufactured parts, cargo containers, luggage, personal identification documents (drivers licenses, passports, visa's, etc.), military construction items and parts); and as a result of this tracking or identifying achieve, at least in part, one of the concerns raised in the discussion above.
  • alternative aspects of the present invention may be adapted for use in reducing counterfeiting, tracking events (such as sporting or entertainment events), minimizing human health concerns over patient consent or privacy or drug receipt, verifying product returns and recalls, tracking vaccines and other biological materials in a private manner, or tracking personnel (e.g.
  • a first code is created (usually a linear or ID bar code but alternatively a separate 2D or Composite (CS) code may be used as the first code.
  • This first code (A) (usually a linear code) is created by known technology bar code printing systems (usually by off-site printers or by in-line systems at a manufacturer's or user's production line) and would incorporate higher-level or higher- order information such as country code, manufacturer, product description, place of manufacture, etc.
  • a second code (B) is then created.
  • This second code (B) includes specific defined item-level information, specific-item information, or individual-use information such as lot, serial number, pallet, date of manufacture, expiration date, URL access data etc, that is known about a determined item.
  • This second code (B) is generated as a Composite Symbology (CS) code and includes a first part (Bl) and a second part (B2), where one or both parts is a 2D composite component, and where only one part is a 2D composite component the remaining part is a ID linear component, depending upon multiple alternative embodiments.
  • the second code (here B') includes a first part (Bl) is a linear component and a second part (B2) is a 2D component.
  • the second code (B") includes a first part (Bl) as a first 2D component and a second part (B2) as a second 2D component.
  • This type of separation renders the second code (B) unreadable (un-scannable and unrecognizable) and without utility without both (Bl) and (B2) or other portions as will be described.
  • Alternative embodiments of the present invention may optionally provide additional electronic "hooks" or “tails” in either one of the first (Bl) or second parts (B2) of the second code (B) indicating to a properly programmed electronic reader that the other part of the second code (B) is a required element to the second code (rendering the Composite Symbology (CS) Code unreadable when separated) and preventing the reading of the second code (B) where either part (Bl, B2) is lacking.
  • Alternative embodiments to this embodiment may optionally further divide the second code (B) into a third (B3) or even a forth part (B4), rendering the second code (B) unreadable without physically combining all the parts (Bl, B2, B3, or B4).
  • first code (A) may be similarly physically split into a first part (Al) and a second part (A2) and operate in a similar 'unreadable' manner for an additional layer of counterfeit protection.
  • the item-label would be printed with two partial codes, for example Al and B2, (requiring A2 and Bl for comprehensive scanning) thereby preventing scanning at even the higher-level order of information.
  • human readable information may be printed immediately adjacent the code allowing for human-reading of the human-readable information and entering the information in a secure data base to reconstruct a damaged and un-scannable CS code based on the stored specific-item information.
  • a manufacturer, employing the present system, method, product, or apparatus would first initially generate a list of desired tracking information including higher-level and item-level, specific-item, or individual- use information and store that information in a secure "track-able" and useable database system specific to the individual or use.
  • An alternative embodiment to the database system would provide an internet-linked or internet-based system allowing access from multiple geographically dispersed locations (or authorized supply chain partners) each accessible via a secured communication link.
  • a single use item e.g.
  • the manufacture would electronically designate a first code (A) using CS or other technology code containing only higher-level information, and a second code (B) containing either both higher-level and item-level information or only item-level information, wherein the second code (B) is divided into at least a first part (Bl) and a second part (B2).
  • A first code
  • B second code
  • the selection of which type of information (serial number, pallet number, part number etc.) to encode using the present embodiment of the invention is a decision for the individual user.
  • an industry is common to individual users (e.g., the drug industry)
  • the users may collectively designate a third party to uniformly designate an information strategy for specific-item information (i.e.
  • This third party would then provide designated information units in a common data base or set of data bases to each user for incorporation with their secure scanning methods and application to designated specific items.
  • the manufacture would then cause a physical item label to be printed for an item including the first code (A) and only one part or portion (Bl or B2) of the second code (B).
  • the manufacturer would then provide the non-selected part (Bl or B2) of the second code (B) in a secure manner to an authorized end user (Doctor, pharmacy, Hospital user etc.) trained in its use.
  • This type of secure manner may include placing the non-selected part (of second code (B)) on a user specific ID card identifiable to a person, on a scannable card, or in other physical and electronic ways (programmed into a scanner or scanning control system, etc) common to conventional bar code uses.
  • second code (B) may be placed on a user specific ID card identifiable to a person, on a scannable card, or in other physical and electronic ways (programmed into a scanner or scanning control system, etc) common to conventional bar code uses.
  • a two-path delivery practice is provided for at least the physically split second code (B).
  • One path being the label itself, and the second path being the secure transfer to the authorized end user.
  • the specific item label may be read by scanning the first code (A) into a data base and noting higher-level information (NDC, Manufacturer, etc.) but the label cannot be read by scanning the second code (B) without both parts.
  • a counterfeiter, forger, or unauthorized user merely copying duplicating an existing label (e. g., stolen or lost label) cannot complete an electronic entry scan (and detect the code elements themselves) because the second code (B) cannot be read without both parts (Bl, B2).
  • An authorized user would scan the first code (A) on the label into the data base and then by completing code (B) (by either physically holding the unused part of the second code (Bl) next to printed part (B2) and physically completing the second code (B) or by electronically combining (Bl) and (B2) via computer programming solutions) thereby allowing for a completed and successful specific-item or item-level scan of the second code (B) and hence the entire label.
  • the present invention may be adapted and modified in alternative embodiments according to the situational security needs of the manufacture and customer. Several of the optional alternative embodiments are discussed below.
  • a 1-D UPC-A Linear code is created with numeric values as shown: See Symbol 9.
  • unreadable Symbol 10 may optionally be placed on a drug bottle, a syringe body, or on a single specific-item label, and Symbol 9 supplied in a secure manner (physically or electronically) to an authorized end user. When the authorized user combines Symbols 9 and 10 (physically or electronically) the completed code may be read providing a complete amount of item-level information. When Symbol 10 is combined and added to the Linear it would look like this: See Symbol 11. Symbol 11
  • the first and second parts of the second code may be physically separated (printed separately) and separately provided to an end user, preventing copying by counterfeiters and guaranteeing that only the authorized end user employing the separately-provided part of the second code could reassemble the second code for a successful scan.
  • Generating a linked security 1-D bar code enabling reading of combination of the scannable/readable 2-D code and the 1-D code (for each designated supply chain individual) only when joined physically or electronically joined during the scanning/reading process.
  • a manufacturer may follow the steps of:
  • the specific-item information e.g., item or amounts, strengths or other identifiable changes relating to a specific item
  • 22. Recording the entry of each specific item for each authorized supply chain partner whereby a report of such authorized entry (or report of rejected unauthorized attempted entry) and partner provides a certifiable pedigree chain of that a specific designated item from the specific manufacturer to end users via computer with access to the World Wide Web.
  • the phrase product and/or items should be understood as a word-label used by a manufacturer in a particular circumstance.
  • a drug company may use the phrase “item” to identify a single dose (1-pill or 1- ampoule) of a drug but may simultaneously use the phrase “product” or “item” to identify a single package containing a single drug product (1-pill or ampoule) or several drug products (10 pills).
  • a shipping company may designate tracking an "item” or a "product” as a pallet containing multiple-packaged items (products) designated as suitable for item-specific tracking purposes of the shipping company.
  • data base, storage system, or internet data base or controlling system or managing program should be generally understood to represent a type of software (and optionally including hardware) system capable of maintaining a secure and authorized-use accessible data base or storage system (either on the internet or within an intranet or elsewhere) effective to act in any of the manners described herein (i.e., receiving and storing item specific designations, encoding these designations, printing labels and encoded portions of an encoded item specific designation, updating along the supply chain, issuing pedigree, tracking, and authorized user reports, or counterfeit, stolen, or lost goods reports, tracking access, updating information, rebuilding damaged Composite Symbology labels etc.)
  • a drug company may generate an "item a" identifier (e.g.
  • a manufacturer makes a decision to identify a "product" or selected specific "item” and in a second step 2 assigns and designates an item specific numbering system providing a specific ID containing all the information the manufacturer determines should be tracked for that specific "product” or "item.”
  • the manufacturer assigns a unit specific serial or designated number to the product and in a fourth step 4 authorizes a designated party to create a 2D composite bar code for that particular item or product in a known selectable type of composite code system.
  • An example of a 2D composite bar code is provided.
  • this 2D composite bar code may optionally include coded "hooks” requiring simultaneous scanning or electronic "reading” (with a data base system) a linked ID bar code to complete a scan and access the product/unit data base list. It is also optionally acceptable that the 2D composite code does not include
  • the bar code is printed through commercially accepted printing methods, either off site or on site (manufacturing location), including but not limited to methods such as flexographic, letter press, ink jet, laser, thermal, or other non- enumerated printing method.
  • a scanning program on-site the ID or 2D or combination of both are scanned and the serial numbers stored in a master data system.
  • the supply chain partner has already generated or received a secure ID or 2D partner specific bar code linked in the manufacturers or other's master database including the specific-item information and optionally linked to a designated partner/user/employee/ specific scanner or CPU etc.
  • the supply chain partner physically holds (or electronically combines) the partner specific ID bar code (one example shown) adjacent the 2D composite code thereby physically (or electronically) reconstructing in step 9 the complete scannable composite 1D+2D bar code (Composite Symbology code).
  • the combined codes are shown in representation.
  • step 10 the complete 1D+2D bar code is scanned with a scanner containing or linked with a computer containing a specific access mechanism (e.g., secure URL address for accessing an Internet database).
  • step 11 the supply chain partner's scanner's CPU identifier tag (unique to each CPU) is compared by the master data system to an authorized user's CPU tag and accepted or rejected (this is one optional additional security feature).
  • step 12 the supply chain partner is then prompted to log-in verifying information (via key board or additional bar code scan) and is accepted or rejected (an additional optional security feature).
  • step 13 where the supply chain partner is verified, the combined ID and composite 2D bar code information is entered (physically where a label is damaged or electronically scanned) into the secure database system and compared to a manufacturer's authentic item product information.
  • the data base system renders a determination/authentication regarding the item/product and the user and may optionally generate a pedigree/approval/rejection report or electronic notice comparing the received information and the stored information and (if authorized) optionally update the database information and location of the item/product at the supply chain partner.
  • Figs 2 A and 2B one alternative embodiment of the present invention is described employing a designated unit/item/product label 20 and a supply chain authorized employee identification badge 21.
  • label 20 is optionally placed on a single bottle of a product (SuperDrugTM) containing 100 tablets each of 25mg. It is envisioned that in alternative embodiments, label 20 may be modified depending upon a manufacturer or suppliers' needs (e.g., a pallet identifier for a shipping company, a single container for a container company, a cosmetic container or package, or a single tablet or single syringe or injectable ampoule for a drug manufacturer).
  • a pallet identifier for a shipping company e.g., a pallet identifier for a shipping company, a single container for a container company, a cosmetic container or package, or a single tablet or single syringe or injectable ampoule for a drug manufacturer.
  • Label 20 includes a first manufacturer-specific composite 1D/2D general identifier bar code portion 22 covering, for example the NDC and expiration information (including duplicate readable portions) and a second split or de-constructed item-sp cific 2D security composite bar code portion 23 requiring a "hook" or linked code to enable actual reading of code portion 23.
  • Identification badge 21 includes a supply chain partner composite code 24 securely identifying the employee.
  • supply chain partner code 24 is optionally created by the partner for internal tracking of the employee or for other uses determined by the supply chain partner.
  • code 24 would enable the employee to access a protected computer/CPU in a shipping/receiving location or pharmaceutical lab location, and to operate that computer to log-in or log-out specific received or returned items.
  • Identification badge 21 additionally includes the ID bar code 25 that is the second half of the split or de-constructed security composite code portion 23 in label 20.
  • Code 25 may be optionally individually readable (without composite code portion 23) or not depending upon the preferences of the manufacturer, the designer of the secure tracking system, or the supply chain partner.
  • bar code 25 is a single readable ID linear code "hooked" to composite code portion 23.
  • the employee physically places an edge 26 of badge 21 and specifically ID code portion 25 closely adjacent 2D composite code portion 23 and then holds a scanner (not shown) in a position to read both ID code portion 25 and code portion 23 at the same time. The authorized employee then scans the now physically re-combined composite 1D/2D bar code.
  • code portion 23 cannot be read without authorized code portion 25
  • the combination of code portions 23/25 are specific to an individually designated item/product enabling a database to be updated only a single time and rejecting all other attempts, where code portion 23 is duplicated and re-scanned (by a copyist, infringer, or in error)
  • the manufacturer's and supply chain partner's database will reject the item/product scan as a counterfeit, infringing, or previously scanned item and notify designated individuals according to an optional programming loop.
  • an underlying security and authentication system enables an electronic or printed flag to be provided to designated individual upon the entry or attempted entry of a scan. In this manner, where a manufacture reports lost or stolen items, the data base flags those specific items, and if the items are rescanned in an unexpected location or by an unauthorized supply chain partner the system will reject the attempted scan and report the attempted counterfeit to the manufacturer.
  • an overt type is another adaptation of the present alternative embodiment.
  • FIG. 3 Another alternative method for practicing one aspect of the present invention is visually described in reference to an individual designated item product packaging code combined with a second individual (multiple item container) designated code at a manufacture.
  • system 10 may be selected from a plurality of systems capable of both the minimal steps discussed below and the much broader opportunities available in active process control systems, and as such may include additional established electronic links (not shown) and additional control or monitoring modules.
  • a roll for example
  • a scanner 2 regulates movement of the labels into a labeler 3 where the product is labeled with a readable ID label as the product passes by.
  • each step or element may be combined with a master data base or master control system to both manage secure labeling and the production process.
  • a scanner 4 in optional communication with master data system 10, regulates the passage of the product/label combination under a printer or to print head or mechanism in a conventionally known method of printing 5 which either prints a coded specific-item information (e.g., serial number) in a bar code format (with or without human readables), and/or prints an individualized serial number (item identifier) specific to that product into the existing 2D composite containing other identification such as, but not limited to lot/batch, expiration, quantity, etc.
  • both scanner 4 and printer 5, or even the process control machinery itself may access or be controlled by a master data base system linking each product to each label and to each bar code generated in the process.
  • the present invention easily mimics the multi-level item-specific capacity of the more expensive and presently-unworkable RFID system providing substantial cost savings and eliminating the detriments of the RFID system noted earlier. Additionally, the present system, establishes the present practice of multi-level specific-item information tracking (and the supportive data base systems) that must be in place throughout a designated supply chain for a comprehensive transition to the RFID system in the future. In this alternative embodiment, a manufacturer can scan the entire coded pallet label identifying (via secure data base linking) all the individual serial numbers prior to shipping and record their exit from the manufacturing plant in a manner to that similarly envisioned by the RFTD system without the required added infrastructure.
  • a shipper can scan and record the pallet serialized ID number and record receipt in the data based linked with the manufacturer.
  • the shipper opens the pallet and then scans each individualized box or item/product as it is delivered in a manner linked with master data system 10, another designated system (on the Web), or not depending upon a shipper's desire.
  • the authorized receiver or end user then scans the pallet level secure code acknowledging each individualized box or item/product upon receipt via the above described process in a manner linked with the master data base thereby receiving authentication and verification that the items/products received were actually manufactured by the manufacturer and have a pedigree.
  • at least one embodiment of the present invention serves as simple pedigree verification means allowing a single authorized scan to record each individual product in or on a pallet or other container.
  • the master system may optionally provide another way to print and secure additional supply chain master labels linked with the master system.
  • the present invention allows an additional level of security for the additional supply chain partners enabling secure and authorizing scans of individual product codes in a single scan.
  • end users open individual boxes, via secure links to the master database and employing designated and secure coded information, an authorized user may scan an individual item/product and provide proof of receipt to the original manufacturer or receive information regarding the original manufactured product, including for example, original amounts, strengths, lots, expiration dates, NDC, or other identifying enumerators.
  • Yet another possible alternative serialization scenario of one embodiment of the present invention may optionally include the following steps: (a) Manufacturer pre-prints a label or, in an online setting or manufacturing setting, prints any encrypted 2D Composite bar code (2D Symbology encodation) like this Reduced Space Symbology (RSS) Limited Composite, which in this example 1 oo k s 1 i te *i ; _ n i W _D ⁇ T_P-_ ⁇ - IKI (b)
  • RSS Reduced Space Symbology
  • the information contained in this present alternative embodiment would contain (for example) a 'hashed' National Drug Code (e.g.
  • an appropriately pre-programmed scanner or reader parses out the relevant data into data fields, for example like this: NDC 0006987654 Lot XYZ123 Serial Number E5E or 01234567890 and scans these fields them into relevant data fields in a master data base linking the authorized shipping label with the authenticated receiving label.
  • an operator may access a secure master data base and hand-enter the human readable references to recreate the secure symbology label for later scanning and use.
  • one possible alternative embodiment made capable by modification and adaptation of selected features or aspects of the present invention applied to alternative customer needs may provide an RFID Electronic Product Code (EPC) transition by utilizing selected futures of the above described inventions as a bridge to the future RHD/EPC type systems developing within the next decade.
  • EPC Electronic Product Code
  • a management group may develop privately and provide as a service an Electronic Sequence Code (ESCTM) to serialize products at an individual, case, pallet, container or other level and provide an accessible Master Data Base and Authentication system.
  • ESCTM Electronic Sequence Code
  • an outside user would request or generate a designated number of "item" specific codes for use as labels and secure them employing one of the authentication processes discussed above.
  • a secure application software platform a bar code engine, or other device or systems enabled to conduct at one of the optional actions noted above, including sending to authorized users electronic files of any ID or 2 D globally recognized bar code combinations or encrypted representations of same separately or together to a suitably configured commercial printer (on-line/stand-alone).
  • a secure application software platform and bar code engine may be adaptively considered as or adapted to work within at least one of the optional systems and methods described herein.
  • a bar code engine or software platform may be optionally programmed conduct the steps necessary to accomplish one of the alternative embodiments of the present invention or to determine selective steps performed by one alternative embodiment of the invention.
  • a bar code engine or software platform may be designed to optionally include steps of (in one alternative embodiment of the present invention) enumeration, encoding, printing or other- steps as discussed herein, or any one of the steps individually depending upon a users particular system, apparatus, or method of use where off-the shelf and/or custom designed hardware and software units may be adaptively joined in a 'system,' 'platform,' or 'engine' in a manner effective to achieve at least one of the alternative embodiments noted herein.
  • a nail, a screw, and a bolt may not be structural equivalents in that a nail relies on friction between a wooden part and a cylindrical surface, a screw's helical surface positively engages the wooden part, and a bolt's head and nut compress opposite sides of a wooden part, in the environment of fastening wooden parts, a nail, a screw, and a bolt may be readily understood by those skilled in the art as equivalent structures.
  • a nail, a screw, and a bolt may be readily understood by those skilled in the art as equivalent structures.

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Accounting & Taxation (AREA)
  • Finance (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • Health & Medical Sciences (AREA)
  • Electromagnetism (AREA)
  • General Health & Medical Sciences (AREA)
  • Toxicology (AREA)
  • Artificial Intelligence (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

Dans un mode de réalisation, le procédé selon l'invention fait intervenir un système d'identification spécifique d'article sécurisé consistant à identifier un article à un degré déterminé, à produire un premier code d'identification pour l'article, à produire un deuxième code et communiquer celui-ci séparément à un associé, et à donner accès à des données d'identification sécurisées concernant l'article en cas d'autorisation d'utilisation des deux codes. Dans d'autres modes de réalisation, le premier et le deuxième code peuvent éventuellement être liés ou être fournis dans des formats de symbologie composites alternatifs et adaptatifs.
EP04817180A 2003-09-23 2004-04-22 Procede d'augmentation de la securite et d'amelioration de la capacite de stockage d'informations Withdrawn EP1668570A1 (fr)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
US50512703P 2003-09-23 2003-09-23
US53041503P 2003-12-17 2003-12-17
PCT/US2004/012418 WO2005036454A1 (fr) 2003-09-23 2004-04-22 Procede d'augmentation de la securite et d'amelioration de la capacite de stockage d'informations

Publications (1)

Publication Number Publication Date
EP1668570A1 true EP1668570A1 (fr) 2006-06-14

Family

ID=34437268

Family Applications (1)

Application Number Title Priority Date Filing Date
EP04817180A Withdrawn EP1668570A1 (fr) 2003-09-23 2004-04-22 Procede d'augmentation de la securite et d'amelioration de la capacite de stockage d'informations

Country Status (6)

Country Link
US (5) US7207481B2 (fr)
EP (1) EP1668570A1 (fr)
AU (1) AU2004280853A1 (fr)
CA (1) CA2535409A1 (fr)
MX (1) MXPA06001164A (fr)
WO (1) WO2005036454A1 (fr)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10677810B2 (en) 2016-10-07 2020-06-09 Brooks Automation, Inc. Sample tube and method

Families Citing this family (136)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6764009B2 (en) 2001-05-30 2004-07-20 Lightwaves Systems, Inc. Method for tagged bar code data interchange
US7942328B2 (en) 2000-01-03 2011-05-17 Roelesis Wireless Llc Method for data interchange
US7798417B2 (en) 2000-01-03 2010-09-21 Snyder David M Method for data interchange
US7070103B2 (en) * 2000-01-03 2006-07-04 Tripletail Ventures, Inc. Method and apparatus for bar code data interchange
US8719117B2 (en) * 2000-04-21 2014-05-06 Auctnyc 5 Llc Method and apparatus to manage network based return processing
US6666377B1 (en) 2000-07-18 2003-12-23 Scott C. Harris Bar code data entry device
US7845554B2 (en) * 2000-10-30 2010-12-07 Fujitsu Frontech North America, Inc. Self-checkout method and apparatus
CA2535409A1 (fr) * 2003-09-23 2005-04-21 Secure Symbology, Inc. Procede d'augmentation de la securite et d'amelioration de la capacite de stockage d'informations
US8615470B2 (en) * 2003-11-03 2013-12-24 Verify Brand Authentication and tracking system
US7752137B2 (en) 2003-11-03 2010-07-06 Meyers Printing Company Authentication and tracking system
US8103716B2 (en) * 2004-05-05 2012-01-24 United States Postal Service Methods and systems for forwarding an item to an alternative address
US7444197B2 (en) 2004-05-06 2008-10-28 Smp Logic Systems Llc Methods, systems, and software program for validation and monitoring of pharmaceutical manufacturing processes
US7799273B2 (en) 2004-05-06 2010-09-21 Smp Logic Systems Llc Manufacturing execution system for validation, quality and risk assessment and monitoring of pharmaceutical manufacturing processes
JP4532237B2 (ja) * 2004-10-29 2010-08-25 株式会社日立製作所 計算機および計算機におけるアクセス制御方法
KR100653886B1 (ko) * 2004-11-05 2006-12-05 주식회사 칼라짚미디어 혼합코드 및 혼합코드 인코딩 방법과 장치
US7578436B1 (en) * 2004-11-08 2009-08-25 Pisafe, Inc. Method and apparatus for providing secure document distribution
EP1824684B1 (fr) * 2004-11-30 2014-08-20 Panduit Corporation Systeme et procede d'etiquetage fonde sur le marche
EP1856624A2 (fr) * 2005-01-06 2007-11-21 Secure Symbology, Inc. Procede et systeme pour l'amelioration, la modification, et l'addition d'information lors d'un transfert ou d'une transaction
US20080011841A1 (en) * 2005-02-03 2008-01-17 Yottamark, Inc. System and Method of Detecting Product Code Duplication and Product Diversion
US20070215685A1 (en) * 2005-02-03 2007-09-20 Yottamark, Inc. System and Method of Product Identification Using a URL
US8155313B2 (en) * 2005-02-03 2012-04-10 Yottamark, Inc. Systems and methods for employing duo codes for product authentication
US20070205258A1 (en) * 2005-02-03 2007-09-06 Yottamark, Inc. System and Method of Product Information Coding and Authentication
US8300806B2 (en) * 2005-02-03 2012-10-30 Yottamark, Inc. Duo codes for product authentication
US7614546B2 (en) * 2005-02-03 2009-11-10 Yottamark, Inc. Method and system for deterring product counterfeiting, diversion and piracy
US8649512B2 (en) 2005-02-03 2014-02-11 Yottamark, Inc. Duo codes for product authentication
US7543748B2 (en) * 2005-02-16 2009-06-09 Pisafe, Inc. Method and system for creating and using redundant and high capacity barcodes
EP2605201A1 (fr) * 2005-03-11 2013-06-19 Avery Dennison Corporation Procédé de traitement d'une commande de billet
US8472046B2 (en) * 2005-03-11 2013-06-25 Avery Dennison Corporation Printer systems and methods for global tracking of products in supply chains, authentication of products, and connecting with customers both before, during, and after a product sale
US7941376B2 (en) * 2005-03-16 2011-05-10 Dt Labs, Llc System and method for customer authentication of an item
US8261058B2 (en) * 2005-03-16 2012-09-04 Dt Labs, Llc System, method and apparatus for electronically protecting data and digital content
US20100005509A1 (en) * 2005-03-16 2010-01-07 Dt Labs, Llc System, method and apparatus for electronically protecting data and digital content
US10636040B2 (en) 2005-03-16 2020-04-28 Dt Labs, Llc Apparatus for customer authentication of an item
US8613107B2 (en) * 2005-03-16 2013-12-17 Dt Labs Development, Llc System, method and apparatus for electronically protecting data associated with RFID tags
US7624923B2 (en) * 2005-07-11 2009-12-01 Verizon Business Global Llc Providing directed content to anonymous customers
US7624925B2 (en) * 2005-07-11 2009-12-01 Get Solo, Llc Membership cards
US7970788B2 (en) * 2005-08-02 2011-06-28 International Business Machines Corporation Selective local database access restriction
GB2430783B (en) * 2005-10-03 2010-12-22 Fracture Code Corp Aps Two-part code
US7933923B2 (en) 2005-11-04 2011-04-26 International Business Machines Corporation Tracking and reconciling database commands
US20070198569A1 (en) * 2005-12-07 2007-08-23 The Regents Of The University Of California Counterfeit detection
US7571864B2 (en) 2005-12-16 2009-08-11 Pisafe, Inc. Method and system for creating and using barcodes
US7823768B2 (en) * 2006-02-02 2010-11-02 Yottamark, Inc. System and method of code generation and authentication
KR100781497B1 (ko) * 2006-05-11 2007-11-30 이승란 개인맞춤서비스의 맞춤코드설정 관리시스템 및 그서비스방법
US9111157B2 (en) * 2006-08-16 2015-08-18 Insight Holding Group, Inc. System and method for tracking shopping behavior
US7866543B2 (en) * 2006-11-21 2011-01-11 International Business Machines Corporation Security and privacy enforcement for discovery services in a network of electronic product code information repositories
US8141100B2 (en) 2006-12-20 2012-03-20 International Business Machines Corporation Identifying attribute propagation for multi-tier processing
CN101201886B (zh) * 2007-01-15 2012-08-22 于志 一种数字化识别商品的方法
US8527539B2 (en) * 2007-01-24 2013-09-03 Oracle International Corporation System and method for a central index for RFID data with data privilege indicia
US8516538B2 (en) * 2007-02-01 2013-08-20 Frequentz Llc Providing security for queries to electronic product code information services
US8495367B2 (en) 2007-02-22 2013-07-23 International Business Machines Corporation Nondestructive interception of secure data in transit
US7852195B2 (en) * 2007-03-27 2010-12-14 Valmarc Corporation Authentication of source, plus, for goods and services system, method, and components
US8333322B2 (en) * 2007-03-30 2012-12-18 Sony Corporation Product identification system with component characteristics
US8342393B2 (en) 2007-09-07 2013-01-01 Yottamark, Inc. Attributing harvest information with unique identifiers
MX2010002554A (es) * 2007-09-07 2010-04-01 Yottamark Inc Metodos y sistemas de atribucion de informacion de cosecha con identificadores unicos.
US8210430B1 (en) 2011-02-24 2012-07-03 Yottamark, Inc. Methods for assigning traceability information to and retrieving traceability information from a store shelf
US20090065568A1 (en) * 2007-09-07 2009-03-12 Elliott Grant Systems and Methods for Associating Production Attributes with Products
US8887990B2 (en) 2007-09-07 2014-11-18 Yottamark, Inc. Attributing harvest information with unique identifiers
US8152063B1 (en) 2009-05-22 2012-04-10 Yottamark, Inc. Case labeling for field-packed produce
US8196827B1 (en) 2009-05-22 2012-06-12 Yottamark, Inc. Case labeling for field-packed produce
JP4871841B2 (ja) 2007-11-08 2012-02-08 キヤノン株式会社 印刷制御装置および印刷制御方法ならびにそのプログラムおよび記憶媒体
US20090150402A1 (en) * 2007-12-10 2009-06-11 Stelter Eric C Security customization system and method
US20090193106A1 (en) * 2008-01-24 2009-07-30 Christophe Bouten System and method for managing message transport in a virtual environment
US8428773B1 (en) 2008-02-12 2013-04-23 Yottamark, Inc. Systems and methods of associating individual packages with harvest crates
CA2721672A1 (fr) * 2008-04-21 2009-10-29 Verichk Global Technology Inc. Systeme et appareil pour authentifier un element de valeur et procede de controle d'utilisation associe
US8261326B2 (en) 2008-04-25 2012-09-04 International Business Machines Corporation Network intrusion blocking security overlay
US8240564B2 (en) 2008-07-11 2012-08-14 Yottamark, Inc. Mobile table for implementing clamshell-to-case association
US7766240B1 (en) 2008-07-19 2010-08-03 Yottamark, Inc. Case-Level Traceability without the need for inline printing
US8146816B2 (en) 2008-10-08 2012-04-03 International Business Machines Corporation Multi-modal one-dimensional barcodes
US8332240B1 (en) 2008-11-11 2012-12-11 VEMR, Inc. Method and system for tracking and monitoring vaccine and pharmaceutical information
US9666008B2 (en) * 2009-09-01 2017-05-30 Opsec Security Group, Inc. Optically variable security device, and article employing same and method for verifying the authenticity of an article
KR101068654B1 (ko) * 2009-09-24 2011-09-28 이재승 타임캡슐 전달시스템 및 타임캡슐 전달방법
US20110084127A1 (en) * 2009-10-08 2011-04-14 Elliott Grant Voice Code for Distribution Centers
JP5640529B2 (ja) * 2009-10-17 2014-12-17 三菱マテリアル株式会社 赤外線センサ及びこれを備えた回路基板
CN101783092A (zh) * 2010-03-12 2010-07-21 孙峰 一种防伪和防串货装置
US20110227928A1 (en) * 2010-03-17 2011-09-22 Jay Ungos Online Barcode Directory and Systems for Facilitating Transactions Utilizing the Same
US8708221B1 (en) * 2010-04-28 2014-04-29 Plastipak Packaging, Inc. Packaging information distribution and tracking system and method
KR101245667B1 (ko) * 2010-09-13 2013-03-20 주식회사 마인드웨어코퍼레이션즈 휴대기기를 이용한 제품의 사후관리방법
US9292717B2 (en) * 2010-12-16 2016-03-22 Peter Malcolm Moran Apparatus for forming and reading an identification feature and method thereof
US9436770B2 (en) 2011-03-10 2016-09-06 Fastechnology Group, LLC Database systems and methods for consumer packaged goods
US10832015B2 (en) 2011-03-10 2020-11-10 Joseph A. Hattrup Trust Dated July 16, 1996, As Amended On-the-fly marking systems for consumer packaged goods
KR101748370B1 (ko) * 2011-03-24 2017-06-19 에스케이플래닛 주식회사 식별 코드 운용 시스템과 방법 및 이를 지원하는 장치
US9087315B1 (en) * 2011-04-05 2015-07-21 Globaltrak Llc Method and apparatus for a handheld terminal and applications for implementation of secure authorization for handling freight
US9022280B2 (en) 2011-06-24 2015-05-05 Verisign, Inc. Multi-mode barcode resolution system
ES2400144B1 (es) * 2011-07-22 2014-03-05 Bodega Matarromera, S.L. Procedimiento para obtención de información de un producto durante su trazabilidad.
US9619774B2 (en) 2011-09-01 2017-04-11 International Business Machines Corporation Product tracking system
US8821277B2 (en) * 2011-12-16 2014-09-02 Wesley John Boudville Colour barcodes and cellphone
WO2013163661A1 (fr) * 2012-04-25 2013-10-31 Featurepointe Systèmes et procédés destinés à un service d'autorisation relative à un produit
US9116969B2 (en) 2012-04-30 2015-08-25 International Business Machines Corporation Generation of electronic pedigree
FR2990978A1 (fr) * 2012-05-25 2013-11-29 Exaqtworld Dispositif antivol d'article commercial
US9053312B2 (en) 2012-06-19 2015-06-09 Paychief, Llc Methods and systems for providing bidirectional authentication
US9342611B2 (en) 2012-06-22 2016-05-17 Paychief Llc Systems and methods for transferring personal data using a symbology
US8997184B2 (en) * 2012-06-22 2015-03-31 Paychief Llc Systems and methods for providing a one-time authorization
US8919640B2 (en) 2012-06-22 2014-12-30 Paychief Llc Methods and systems for registering relationships between users via a symbology
US9384192B2 (en) 2012-07-25 2016-07-05 Leica Biosystems Imaging, Inc. Systems and methods for tracking a slide using a composite barcode label
US9167124B2 (en) * 2012-07-27 2015-10-20 The Neat Company, Inc. Portable document scanner having user interface and integrated communication means
KR101765479B1 (ko) * 2012-07-31 2017-08-07 삼성에스디에스 주식회사 보안물품 관리시스템 및 관리방법
US10621481B2 (en) 2012-08-30 2020-04-14 Hewlett-Packard Development Company, L.P. Generating a regressive information object
CN104798085B (zh) * 2012-08-30 2018-10-02 惠普发展公司,有限责任合伙企业 生成回归的信息对象
DE102013200970A1 (de) * 2012-10-22 2014-04-24 Atlantic Zeiser Gmbh Verfahren zum Schutz eines Wiedererkennungsmerkmals
US9576264B2 (en) 2012-11-12 2017-02-21 Global Healthcare Exchange, Llc Systems and methods for supply chain management
US8918341B2 (en) * 2013-03-06 2014-12-23 United States Postal Service System and method for international merchandise return service
US9652775B2 (en) * 2013-03-15 2017-05-16 Pasquale Vincent Costa System, method, procedure and components for preparing an article for authentication and tracking
US9062999B2 (en) * 2013-03-15 2015-06-23 Catalina Marketing Corporation System and method of encoding item information from a scale in a self-service scanning solution
US8888005B2 (en) 2013-04-12 2014-11-18 David Prokop Uniquely identifiable drug dosage form units
WO2014182652A2 (fr) * 2013-05-06 2014-11-13 HURU Systems Ltd. Suivi et gestion d'actifs
US9218235B2 (en) 2013-09-25 2015-12-22 Lexmark International, Inc. Systems and methods of verifying operational information associated with an imaging device
US9357102B2 (en) 2013-09-25 2016-05-31 Lexmark International, Inc. Systems and methods of securing operational information associated with an imaging device
EP3105705A4 (fr) 2014-03-07 2018-03-07 Lockheed Martin Corporation Procédés et systèmes de réduction de la probabilité de faux positifs de décodage
CN105407071A (zh) * 2014-08-29 2016-03-16 阿里巴巴集团控股有限公司 一种信息展示方法、客户端、服务器及系统
US9969518B2 (en) 2014-09-05 2018-05-15 Medical Packaging Inc. Semi-automatic syringe label applicator
US10558879B2 (en) 2014-10-30 2020-02-11 Hewlett-Packard Development Company L.P. Digital signature authentication
US10192198B2 (en) 2014-11-05 2019-01-29 HURU Systems Ltd. Tracking code generation, application, and verification using blockchain technology
US9741012B2 (en) 2014-11-05 2017-08-22 HURU Systems Ltd. Systems for secure tracking code generation, application, and verification
CN104463600A (zh) * 2014-11-12 2015-03-25 张曙波 防伪方法
CN104463599A (zh) * 2014-11-12 2015-03-25 张曙波 条形码防伪方法
EP3051469B1 (fr) * 2015-01-28 2024-05-22 Inexto Sa Procédé et appareil pour l'identification et le suivi d'une unité et d'un récipient
CN104794619B (zh) * 2015-03-25 2018-08-24 同济大学 用于商品包装的防窜货数字信息映射编码方法
WO2016179182A1 (fr) 2015-05-04 2016-11-10 United States Postal Service Système et procédé de traitement d'articles pour distribution internationale
US9595038B1 (en) * 2015-05-18 2017-03-14 Amazon Technologies, Inc. Inventory confirmation
US10593007B1 (en) 2015-06-11 2020-03-17 Digimarc Corporation Methods and arrangements for configuring industrial inspection systems
US9922220B2 (en) * 2015-06-11 2018-03-20 Digimarc Corporation Image block selection for efficient time-limited decoding
BR112018006539A2 (pt) 2015-09-30 2018-10-16 Aintu Inc método e sistema para autenticação de um artigo de fabricação
US20170193525A1 (en) * 2015-12-31 2017-07-06 Salim Shah System and Method for Detecting Counterfeit Products
WO2017202754A1 (fr) * 2016-05-27 2017-11-30 Graphic West Aps Vérification d'impression et de code sur un objet
US20190034872A1 (en) * 2017-07-31 2019-01-31 James J. Sullivan System and Method of Automatically Recording Compliance Data for Shipped Pharmaceutical Products Subject to Supply Chain Tracking Regulations
US11049279B2 (en) * 2018-03-27 2021-06-29 Denso Wave Incorporated Device for detecting positional relationship among objects
EP3572925A1 (fr) 2018-05-21 2019-11-27 Dover Europe Sàrl Procédé et système d'impression d'informations sérialisées
US10936837B1 (en) * 2018-05-23 2021-03-02 Amazon Technologies, Inc. 2D barcode overlays
CN109598518A (zh) * 2018-09-30 2019-04-09 阿里巴巴集团控股有限公司 基于区块链的防伪方法及装置、电子设备
US11961037B2 (en) * 2019-04-30 2024-04-16 Global Sticks Express, LLC Shipping items using an electronic shipping label device
US10846436B1 (en) * 2019-11-19 2020-11-24 Capital One Services, Llc Swappable double layer barcode
EP4081961A1 (fr) * 2019-12-23 2022-11-02 Henkel Global Supply Chain B.V. Procédé et système de commande d'articles dans une chaîne de fabrication
US11250156B2 (en) 2019-12-24 2022-02-15 Capital One Services, Llc System for encrypting and mailing sensitive information
US11682095B2 (en) * 2020-02-25 2023-06-20 Mark Coast Methods and apparatus for performing agricultural transactions
IT202100000149A1 (it) * 2021-01-05 2022-07-05 Themis S R L Sistema e metodo per il tracciamento e per garantire la qualità di materie prime
US20240095483A1 (en) * 2022-09-20 2024-03-21 Brandsguards Technology Co., Ltd. Two layers qr code label anti-counterfeiting system
CN115931905B (zh) * 2023-02-02 2023-09-26 北京百度网讯科技有限公司 Poy产品的检测方法、装置、电子设备和存储介质

Family Cites Families (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5448046A (en) * 1987-12-28 1995-09-05 Symbol Technologies, Inc. Arrangement for and method of expediting commercial product transactions at a point-of-sale site
US5124538B1 (en) * 1988-08-26 1995-01-31 Accu Sort Systems Inc Scanner
JPH07101427B2 (ja) * 1989-03-29 1995-11-01 富士通株式会社 バーコード読取り方法及びその装置
US6076733A (en) * 1993-11-24 2000-06-20 Metrologic Instruments, Inc. Web-based system and method for enabling a viewer to access and display HTML-encoded documents located on the world wide web (WWW) by reading URL-encoded bar code symbols printed on a web-based information resource guide
US5296691A (en) * 1992-09-14 1994-03-22 Lazerdata Corporation Scanning device for reconstructing a complete code from scanned segments
US5602377A (en) * 1995-03-01 1997-02-11 Metanetics Corporation Bar code dataform scanning and labeling apparatus and method
US6038200A (en) * 1996-06-27 2000-03-14 Sony Corporation Autochanger
US5929415A (en) 1997-04-28 1999-07-27 Pitney Bowes Inc. Postage metering refill system that utilizes information contained in information based indicia to audit the franking process
DE69810898T2 (de) * 1998-05-20 2003-11-13 Datalogic S.P.A., Lippo Di Calderara Di Reno Verfahren zur Wiederherstellung aufeinanderfolgender Abtastungen eines Strichcodes
US6158660A (en) * 1999-02-25 2000-12-12 Ncr Corporation Methods and apparatus for supplemental barcode detection and decoding
US6631843B2 (en) * 2000-02-18 2003-10-14 Symbol Technologies, Inc. Composite code symbology
CZ200324A3 (cs) 2000-06-05 2007-01-31 Optaglio Limited Ověření produktu, systém a metoda prokázání pravosti produktu
NZ532929A (en) 2001-10-26 2008-09-26 Int Barcode Corp Method and apparatus for applying bar code information to products during production
US7206433B2 (en) * 2002-12-30 2007-04-17 Pitney Bowes Inc. Method for printing high information density machine-readable composite images
CA2535409A1 (fr) * 2003-09-23 2005-04-21 Secure Symbology, Inc. Procede d'augmentation de la securite et d'amelioration de la capacite de stockage d'informations

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
See references of WO2005036454A1 *

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10677810B2 (en) 2016-10-07 2020-06-09 Brooks Automation, Inc. Sample tube and method

Also Published As

Publication number Publication date
CA2535409A1 (fr) 2005-04-21
US20070119955A1 (en) 2007-05-31
US7207481B2 (en) 2007-04-24
US20060237547A1 (en) 2006-10-26
MXPA06001164A (es) 2006-08-31
US20080011843A1 (en) 2008-01-17
US20070119954A1 (en) 2007-05-31
WO2005036454A1 (fr) 2005-04-21
US20050061878A1 (en) 2005-03-24
US7261235B2 (en) 2007-08-28
AU2004280853A1 (en) 2005-04-21

Similar Documents

Publication Publication Date Title
US7261235B2 (en) Method for improving security and enhancing information storage capability, the system and apparatus for producing the method, and products produced by the system and apparatus using the method
US20080073432A1 (en) Method And System For Improving, Modifying, And Adding Information During A Transfer Or Transaction
US8543411B2 (en) Systems and methods for detecting counterfeit pharmaceutical drugs at the point of retail sale
US5768384A (en) System for identifying authenticating and tracking manufactured articles
US7810726B2 (en) Method and system for tracking and verifying medication
US7387249B2 (en) Product verification and authentication system and method
US4558318A (en) Merchandise verification and information system
US4816824A (en) Merchandise verification and information system
US20070056041A1 (en) Method and device for product and document authentication
US20080072059A1 (en) System and Methods for Transportation and Delivery Using Bar Codes
WO2004021272A1 (fr) Procede pour empecher la designation falsifiee dans le domaine de la distribution des biens de consommation et dispositif d'impression d'etiquettes muni d'une fonction anti-falsifications utilisant ce procede
JP2021524638A (ja) 物品の偽造防止保護
WO1999051445A1 (fr) Procede permettant d'empecher la contrefaçon et d'authentifier les signatures
US20080285847A1 (en) Dynamo color coding system to validate, authenticate goods and services
US4739322A (en) Merchandise verification and information system
US6030001A (en) Method for deterring forgeries and authenticating signatures
EP1305778A1 (fr) Syst me et proc d s de surveillance d'articles
WO2007025045A2 (fr) Procede et systeme permettant d'accroitre la capacite d'enregistrement et d'ameliorer la securite
Giacalone Drug Wholesaling and Importation: Challenges and Opportunities
USRE38044E1 (en) Method for deterring forgeries and authenticating signatures
Bellman Product traceability in the pharmaceutical supply chain: an analysis of the auto-ID approach
Rached Barriers to the Implementation of a Unique Identifier and a Track and Trace System in the Lebanese Pharmaceutical Sector
WO2015131163A1 (fr) Procédé, système et appareil pour créer une amélioration
Chowdhary et al. STRENGTHENING PHARMACEUTICAL SUPPLY CHAIN SECURITY IN EUROPE: SERIALIZATION AND EMERGING TECHNOLOGIES
Quirk Jr RFID: Deployment Continues Amid Regulatory Challenges

Legal Events

Date Code Title Description
PUAI Public reference made under article 153(3) epc to a published international application that has entered the european phase

Free format text: ORIGINAL CODE: 0009012

17P Request for examination filed

Effective date: 20060210

AK Designated contracting states

Kind code of ref document: A1

Designated state(s): AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IT LI LU MC NL PL PT RO SE SI SK TR

DAX Request for extension of the european patent (deleted)
REG Reference to a national code

Ref country code: HK

Ref legal event code: DE

Ref document number: 1093110

Country of ref document: HK

17Q First examination report despatched

Effective date: 20070518

RAP1 Party data changed (applicant data changed or rights of an application transferred)

Owner name: SECURE SYMBOLOGY, INC.

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: THE APPLICATION IS DEEMED TO BE WITHDRAWN

18D Application deemed to be withdrawn

Effective date: 20081101

REG Reference to a national code

Ref country code: HK

Ref legal event code: WD

Ref document number: 1093110

Country of ref document: HK